Malvertising attack distributes malicious Chrome extensions, backdoors

Researchers believe that the campaign has been active since 2018, and since then, the malware has been under development constantly. Cisco Talos researchers have identified malvertising campaigns using fake installers…

What Is Privilege Escalation? Definition, Types and Examples

Privilege escalation might be a confusing cybersecurity term for many. That’s why in this article we’re going to shed a little bit more light on this topic. Keep reading to…

80K Retail WooCommerce Sites Exposed by Plugin XSS Bug

The Variation Swatches plugin security flaw lets attackers with low-level permissions tweak important settings on e-commerce sites to inject malicious scripts. The plugin “Variation Swatches for WooCommerce,” installed across 80,000…

Toss a Coin to your Helper (Part 2 of 2)

Avast –  Avast –  In the first posting of this series, we looked at a clipboard stealer belonging to the MyKings botnet. In this second part of the blog series,…

DNA testing service data breach impacting 2.1 million users

DNA Diagnostics Center (DDC) has revealed that hackers managed to access highly sensitive and personal data of users including payment card data. The Fairfield, Ohio-based DNA testing service DNA Diagnostics…

The BABADEDA Crypter – an Emerging Crypter targeting the Crypto, NFT, and DeFi communities

INTRODUCTION The cryptocurrency market is now worth more than $2.5 trillion. Unfortunately, this fact is not lost on threat actors. As well as using cryptocurrency themselves to extract ransoms, cybercriminals…

Application Whitelisting Concepts: Definition, Types, Implementation and Best Practices

The simplest way to stop malicious code from infiltrating your network is by automatically blocking it before it even enters the system. A straightforward and efficient way to achieve that…

Ethical Hacking, book review: A hands-on guide for would-be security professionals

Ethical Hacking: A Hands-on Introduction to Breaking In • By Daniel G Graham • No Starch Press • 376 pages • ISBN 9781718501874 • £41.99 / $49.99    The parlous…

GoDaddy hacked – Hackers access data of 1.2 million customers

GoDaddy detected unauthorized access to its systems where it hosts and manages its customers’ WordPress servers. The Scottsdale, Arizona-based web registrar and hosting firm GoDaddy has disclosed that it suffered…

GoDaddy’s Latest Breach Affects 1.2M Customers

The kingpin domain registrar has logged its fifth cyber-incident since 2018, after an attacker with a compromised password stole email addresses, SSH keys and database logins. Web-hosting giant GoDaddy has…